Lucene search

K
openvasCopyright (C) 2014 Greenbone AGOPENVAS:1361412562310105142
HistoryDec 18, 2014 - 12:00 a.m.

Symantec Web Gateway < 5.2.2 Command Injection Vulnerability

2014-12-1800:00:00
Copyright (C) 2014 Greenbone AG
plugins.openvas.org
17

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.7 High

AI Score

Confidence

High

0.468 Medium

EPSS

Percentile

97.5%

Symantec Web Gateway is prone to a command injection
vulnerability.

# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later

CPE = "cpe:/a:symantec:web_gateway";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.105142");
  script_cve_id("CVE-2014-7285");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_version("2023-05-16T09:08:27+0000");

  script_name("Symantec Web Gateway < 5.2.2 Command Injection Vulnerability");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/71620");
  script_xref(name:"URL", value:"http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2014&suid=20141216_00");

  script_tag(name:"impact", value:"Successfully exploiting this issue may allow an attacker to
  execute arbitrary OS commands in the context of the affected appliance.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Symantec was notified of an OS command injection vulnerability
  in PHP script which impacts the SWG management console.  The results of successful exploitation
  could potentially range from unauthorized disclosure of sensitive data to possible unauthorized
  access to the Symantec Web Gateway Appliance.");

  script_tag(name:"solution", value:"Update to version 5.2.2 or later.");

  script_tag(name:"summary", value:"Symantec Web Gateway is prone to a command injection
  vulnerability.");

  script_tag(name:"affected", value:"Symantec Web Gateway versions prior to 5.2.2.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"last_modification", value:"2023-05-16 09:08:27 +0000 (Tue, 16 May 2023)");
  script_tag(name:"creation_date", value:"2014-12-18 10:41:05 +0100 (Thu, 18 Dec 2014)");
  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_banner");
  script_family("Web application abuses");
  script_copyright("Copyright (C) 2014 Greenbone AG");
  script_dependencies("gb_symantec_web_gateway_detect.nasl");
  script_mandatory_keys("symantec_web_gateway/installed");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if( ! vers = get_app_version( cpe:CPE, port:port ) )
  exit( 0 );

if( version_is_less( version:vers, test_version:"5.2.2" ) ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:"5.2.2" );
  security_message( port:port, data:report );
  exit (0 );
}

exit( 99 );

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

8.7 High

AI Score

Confidence

High

0.468 Medium

EPSS

Percentile

97.5%